Blog

Blog

Think Your Encrypted Email Is Secure? It Might Be. . . Or Not!

When sending out an email, a lot can go wrong. To get around that, many people encrypt. And that’s a great solution. But a lot can go wrong with that, too.Is the answer to this to start delivering all your messages by hand or pigeon carrier? No. But it certainly involves having a multi-dimensional view of what it is to send a fully secure email and an understanding of the ways in which we can mess...
Blog

Zero-Day Threats: How Cloud Email Security Can Mitigate Risks

By Q3 2024, organizations encountered credential theft in nearly 50% of all email security threats they handled, while malware grew by 4% which is the highest amount of volume since Q1. Learn how cloud-based solutions can help detect and prevent zero-day attacks like malware and more.
Blog

Best Practices for Using Secure Encrypted Email in Business

Attackers increasingly use sophisticated methods to spy on your emails directly, which is why the very information contained therein needs to be encrypted. This is defense in depth, not only protecting your email from without but securing it from within.
Blog

Top Threats to Cloud Email Security and How to Mitigate Them

A summary of common threats faced by cloud email systems beyond malware and data breaches, this blog provides actionable tips and best practices for businesses to protect their email systems.
Blog

Email Protection Strategies for Modern Enterprises

Modern enterprises need to be able to identify the tactics being used by cybercriminals in email attacks, especially those leveraging advanced technologies like AI. Find out what's at stake and how today's email security solutions can help mitigate these evolving attacks.
Blog

Harrowing Tales of Social Engineering Attacks from the Trenches

The social engineering attacks that businesses are seeing today – from hiding payloads in files to commit fraud, to quishing and smishing – and what can be done about them.
Blog

Harnessing Data Science and AI in Cybersecurity

In this Solutions Review article, Ravisha Chugh from Fortra explains how companies are harnessing data science and AI technologies in their cybersecurity initiatives.
Blog

Will 2024’s Presidential Election Day Be Groundhog Day When It Comes to Nation-State Email Attacks?

With 2024's presidential election around the corner, Fortra discusses the blunt-force impact of campaigns not hardening their cybersecurity, such as campaign impersonation, donation scams and fraud, and the possibility that it will be cybercriminals who decide the next President of the United States—not voters.
Blog

Understanding DMARC Reports

Why is it so important to analyze DMARC reports? Well, it makes it so organizations can detect malicious emails and prioritize source configuration, all of which is crucial for maintaining their email security.
Blog

How to Defend Against Stegomalware

Stegomalware is still a relatively unknown term but is becoming more widely leveraged in malware. So you need to know about this semi-low-tech, yet innovative tactic that is imperceptible to the human eye.
Blog

What You Need to Know About Stegomalware

It all sounds like the stuff of Sherlock Holmes or “Mission Impossible”, but steganographic malware, or stegomalware for short, is a real thing that broadly describes a host of tactics used to hide data in plain sight.
Blog

Preventing Email Leaks in Business Environments

By understanding email data leaks, their value to attackers, and their root causes, organizations can stay savvy and set up the right tools to thwart many email-targeting attempts.
Blog

Are You Ready for PCI DSS 4.0?

PCI DSS 4.0 is here. If your organization handles PII data, you will need to be compliant with the new updates. We take a look at the new version and what it takes to stay compliant.
Blog

How Fortra's Clearswift Secure Email Gateway Aligns to NCSC's Email Security Guidelines

Working in cybersecurity is one of the most challenging roles in the organisation. Not only are you tasked with keeping the business and its data safe and secure, but you must do so in the face of ever-increasing professionalism and sophistication on the part of cybercriminals.There are more threats than ever before, and the consequences of a data breach are more significant too. In recent Fortra...